Defense Industrial Base Voluntary Cyber Security/Information Assurance (DIB CS/IA) Points of Contact (POC) Information

Defense Industrial Base Voluntary Cyber Security/Information Assurance (DIB CS/IA) Points of Contact (POC) Information

POC collection_Application process mockup.pptx

Defense Industrial Base Voluntary Cyber Security/Information Assurance (DIB CS/IA) Points of Contact (POC) Information

OMB: 0704-0490

Document [pptx]
Download: pptx | pdf

You are accessing a U.S. Government (USG) Information System (IS) that is provided for
USG-authorized use only.

By using this IS (which includes any device attached to this IS), you consent to the following
conditions:

- The USG routinely intercepts and monitors communications on this IS for purposes
including, but not limited to, penetration testing, COMSEC monitoring, network
operations and defense, personnel misconduct (PM), law enforcement (LE), and
counterintelligence (CI) investigations.

- At any time, the USG may inspect and seize data stored on this IS.

- Communications using, or data stored on, this IS are not private, are subject to routine
monitoring, interception, and search, and may be disclosed or used for any USG authorized
purpose.

- This IS includes security measures (e.g., authentication and access controls) to protect
USG interests--not for your personal benefit or privacy.

- Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI
investigative searching or monitoring of the content of privileged communications, or
work product, related to personal representation or services by attorneys,
psychotherapists, or clergy, and their assistants. Such communications and work
product are private and confidential. See User Agreement for details.

<number>

 

Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program

 Privacy Statement

Authorities:  10 U.S.C. 2224, 44 U.S.C. 3544, HSPD 7, DoDD 3020.40, DoDD 5505.13E,  DoDI 3020.45, and DoDI 5205.13.

Purpose:  Administrative management of the DIB CS/IA Program’s information sharing activities.  Personal information is covered by OSD SORN DCIO 01, Defense Industrial Base (DIB) Cyber Security/Information Assurance Records.

Routine Use(s):  The DoD Blanket Routine Uses found at http://dpclo.defense.gov/privacy apply to this collection.  Of those blanket routine uses, we anticipate the following two would most likely be used:

DoD Blanket Routine Use 01 (Law Enforcement Routine Use).  If a system of records maintained by a DoD Component to carry out its functions indicates a violation or potential violation of law, whether civil, criminal, or regulatory in nature, and whether arising by general statute or by regulation, rule or order issued pursuant thereto, the relevant records in the system of records may be referred, as a routine use, to the agency concerned, whether federal, state, local, or foreign charged with the responsibility of investigating or prosecuting such violation or charged with enforcing or implementing the statute, rule, regulation, or order issued pursuant thereto.

DoD Blanket Routine Use 14 (Counterintelligence Purpose Routine Use).  A record from a system of records maintained by a DoD Component may be disclosed as a routine use outside the DoD or the U.S. Government for the purpose of counterintelligence activities authorized by U.S. Law or Executive Order or for the purpose of enforcing laws which protect the national security of the United States. 

Disclosure:  Voluntary.  However, failure to provide requested information may limit the ability of the DoD to contact the individual or provide other information necessary to facilitate this program.

Freedom of Information Act (FOIA).  Agency records, which may include qualifying information received from non-federal entities, are subject to request under the Freedom of Information Act (5 U.S.C. 552) (FOIA), which is implemented in the Department of Defense by DoD Directive 5400.07 and DoD Regulation 5400.7-R (see 32 C.F.R. Parts 285 and 286, respectively).  Pursuant to established procedures and applicable regulations, the Government will protect sensitive nonpublic information under this Program against unauthorized public disclosure by asserting applicable FOIA exemptions, and will inform the non-Government source or submitter (e.g., DIB participants) of any such information that may be subject to release in response to a FOIA request, to permit the source or submitter to support the withholding of such information or pursue any other available legal remedies.

<number>

 

Company Application Process

Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program

 

*=Required Field

<number>

 

Company Application Process

Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program

 

*=Required Field

<number>

 

Company Application Process

Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program

 

*=Required Field

<number>

 

Company Application Process

Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program

 

*=Required Field

<number>

 

Company Application Process

Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program

 

*=Required Field

<number>

 

Company Application Process

Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program

 

*=Required Field

<number>

 

Company Application Process

Welcome to the Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program

 

*=Required Field

<number>

 
File Typeapplication/vnd.openxmlformats-officedocument.presentationml.presentation
File Modified0000-00-00
File Created0000-00-00

© 2024 OMB.report | Privacy Policy